Integration of IP REP Datafeed / URL REP Datafeed into Juniper
I need a solution Hi,I am looking for someone who has exerience with integrating our IP or URL Datafeed into Juniper solutions, to block malicious IP/URLs.Can someone share her/his experience with the...
View ArticleIt’s Only Zeus, Don’t Worry… or Should You?
Asymmetric cybercrime: the unconventional use of conventional malware Additional Authors: Roger Parkread more
View ArticleDLP
I need a solution HiIs there any trial copy of Data Loss Prevenstion software availableThanks
View ArticleSetting up alerts and brand protection
I need a solution Hello,We have recently aquired DeepSight and I am trying to set up alerting regarding brand protection monitoring. I am comming across a few issues as I am not able to configure a...
View ArticleWestern New York Security User Group Meeting - October 23, 2015
Location: Dave & Busters (NEW Location - Walden Galleria in Buffalo, NY) Time: Fri, 23 October, 2015 - 12:00 - 16:30 EDTPlease join us for the next Western NY Security User Group Meeting on...
View ArticleFive Threat Intelligence Traps to Avoid
Newly released DarkReading white paper sponsored by Symantec highlights measures organizations can take to avoid these traps Cybersecurity is an ongoing battle. Both adversaries and enterprises are...
View ArticlePhiladelphia Security User Group Meeting - Oct 28, 2015
Location: Victory Brewing Company Time: Wed, 28 October, 2015 - 12:00 - 16:30 EDTIn follow up to the Hershey, Pennsylvania meeting on July 31, 2015, we are hosting the next Philadelphia Security User...
View ArticleMobile Device Security Awareness: How Not to be Dumb with a Smart Phone
Location: Webcast Time: Fri, 16 October, 2015 (All day)Presented by: Kevin Haley, Director, Security Technology And Responseread more
View ArticleWebinar: Cyber Security Best Practices - Symantec's Managed Security Services
Location: Webinar Time: Thu, 29 October, 2015 - 11:00 - 12:00 PDT 2014 report from Ponemon Insitituteread more
View ArticlePrioritizing the Human Element of Cyber Security
Location: Webinar Time: Thu, 22 October, 2015 - 11:00 - 12:00 PDTRealizing that each employee plays an important role in securing data and information, Symantec recently acquired Blackfin Security in...
View ArticleAssign/modify valid license for created alarms with a old license.
Hi Support,We would like to suggest a new feature for future version. We need to be able to change the assigned license to the Delivery Methods (already created) in Deepsight. For now, it is only...
View ArticleWebcast - Cloud9: The Dawning
Location: Webcast Time: Tue, 17 November, 2015 - 11:00 - 12:00 ESTAre you benefitting from the Cloud? While migrating to the Cloud can be daunting, the benefits are overwhelmingly compelling....
View ArticleSymantec Enterprise Security User Forum-Wayne, PA 10-Dec-2015
Location: Marriott Valley Forge, 1100 Drummers Lane, Wayne, PA 19087 Time: Thu, 10 December, 2015 - 10:00 - 14:00 ESTPlease join us for a lunch and learn event where we will discuss some of the...
View ArticleSymantec Enterprise Security User Forum-Bethlehem, PA 08-Dec-2015
Location: Hotel Bethlehem, 437 Main Street, Bethlehem, PA 18018 Time: Tue, 08 December, 2015 - 10:00 - 14:00 ESTPlease join us for a lunch and learn event where we will discuss some of the hottest IT...
View ArticleSymantec Enterprise Security User Forum-Princeton, NJ 02-Dec-2015
Location: Princeton Marriott, 100 College Rd E, Princeton, NJ 08540 Time: Wed, 02 December, 2015 - 10:00 - 14:00 ESTPlease join us for a lunch and learn event where we will discuss some of the...
View ArticleNorthStar, for Symantec DeepSight Intelligence
If you use Symantec’s DeepSight Intelligence you already have the security intel you need. Now there is a way to understand the identified vulnerabilities and the assets they affect with Northstar, the...
View ArticleThreats
I need a solution How threat intelligence feeds help to prioritize signals? Please help 0
View ArticleKey Findings from Symantec’s 2016 Internet Security Threat Report
Location: Webcast Time: Tue, 03 May, 2016 - 9:00 - 10:00 PDTWebcast: May 3, 2016Cyber attacks are increasing in number and sophistication. Today’s threats differ from those encountered a month ago....
View ArticleKey Findings from Symantec’s 2016 Internet Security Threat Report
Webcast: May 3, 2016 Blog Feature Image: Screen Shot 2016-04-29 at 9.28.08 AM.png Twitter Card Style: summary Cyber attacks are increasing in number and sophistication. Today’s threats differ from...
View Article2016 Symantec's Internet Security and Threat Report Webinar
Location: Webinar Time: Wed, 27 April, 2016 - 11:00 - 12:00 PDTEvery year Symantec releases their Internet Security and Threat Report (ISTR). A report based on data Symantec collects, compiles, and...
View Article